There are 12 repositories under privilege-escalation-exploits topic.
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Linux privilege escalation auditing tool
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Collection of things made during my OSCP journey
整理一些内网常用渗透小工具
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Bypass UAC by hijacking a DLL located in the Native Image Cache
Linux Privilege Escalation Tool By WazeHell
system3, Samsung's worst nightmare for a 3rd time!
Bypass UAC by abusing the Internet Explorer Add-on installer
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Privilege escalation in Docker
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC at any level by abusing the Task Scheduler and environment variables
AppXSVC Service race condition - privilege escalation
x64 Windows privilege elevation using anycall
privilege escalation POCs built in Rust.
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Linux & Android Kernel Vulnerability research and exploitation
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
Bypass UAC by abusing shell protocol handlers
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
Copy & paste from original code for support ALL Windows Versions
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Introduction to information security, exploiting a vulnerable ISO.
Vulnerable Flask E-Commerce Cyber Security Group 120
Privilege Escalation
A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。